Beyond Email: 5 Alternative Ways to Fall Victim to Ransomware

How to Protect Your Organization's Websites

Attackers exploit vulnerabilities in web applications to compromise the remote hosts for performing nefarious operations such as uploading malware. Web Application Firewalls (WAFs) should be deployed to prevent application layer attacks. Additionally, system backups and updates are crucial to keeping your website safe – website admins should continuously back up their data and update their software.

Ransomware, without a doubt, is dominating the cyber-threat landscape by holding critical systems and data hostage in industries ranging from health care and finance to government and energy. Ransomware is a class of malware that, when distributed to a system, renders victims' systems unusable by encrypting computers and data or by locking applications. The attacker's goal is to blackmail the victim into paying a ransom in exchange for decryption keys, allowing them to regain control of their systems and data.

Most information and reports about ransomware, however, have focused on phishing as a conduit for ransomware delivery and often overlook other distribution methods in use. Attackers are becoming craftier with their methods to spread malware that encrypts files and locks data, blindsiding victims before they even realize they have been attacked.

So while organizations and individuals are performing everyday tasks – like running their businesses in the cloud and using social media – alternative ways to receive ransomware, which don't require victims to open a phishing email, also pose a serious threat. In this slideshow, Aditya Sood, PhD., director of security and ElasticaCloud Threat Labs at Blue Coat, discusses five alternative ways that organizations can fall victim to ransomware and offers advice on how they can protect themselves.

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ... More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.